Skill
Objective
Assessment Item(s) Step 1.0 – Recognize the Internet is a powerful tool.
Audience:
Behavior:
Condition:
Degree:
Step 1.3 -Recognize the internet can be used for research, social interaction, consumer purchases, political activity.
Audience:
Behavior:
Condition:
Degree: Step 1.4 – Recognize that dangers lurk on the Internet and can take the form of predators, identity theft, bad information, viruses, spyware, cyberbullying.
Audience:
Behavior:
Condition:
Degree:
Step 1.5 – Recognize that basic precautions such as virus protection, evaluating website validity and recognizing cyberbullies can be taken to protect yourself while surfing the Internet.
Audience:
Behavior:
Condition:
Degree:
Step 2.0 – Identify the process for evaluating website validity.
Audience:
Behavior:
Condition:
Degree:
Step 2.1 - Recognize all information presented on the Internet is not valid.
Audience:
Behavior:
Condition:
Degree:
Step 2.2 – Recognize that information on the Internet might be posted to discredit a person, to further a political agenda or for other hidden agendas
Audience:
Behavior:
Condition:
Degree:
Step 2.3 – Identify the steps take to evaluate a website
Audience:
Behavior:
Condition:
Degree:
Step 2.4 – Identify the website extensions .edu, .org, .gov, .com, .us, .au and what type of organization owns that site.
Audience:
Behavior:
Condition:
Degree:
Step 3.0 – Recognize that steps must be taken to maximize protection while using the Internet.
Audience:
Behavior:
Condition:
Degree:
Step 3.1 – Identify the use of virus software and how it can protect you while using the Internet.
Audience:
Behavior:
Condition:
Degree:
Step 3.2 – Recognize that giving out personal information such as full name, address, phone no, age can place you at possible risk on the Internet.
Audience:
Behavior:
Condition:
Degree:
Step 3.3 – Identify the process of Phishing on the Internet.
Audience:
Behavior:
Condition:
Degree:
Step 3.4 -Recognize that P2P file sharing can result in viruses and can violate copyright laws.
Audience:
Behavior:
Condition:
Degree:
Step 4.0 – Recognize that people misrepresent themselves on the Internet.
Audience:
Behavior:
Condition:
Degree:
Step 4.1 – Recognize that messages might be sent from an anonymous source and a user might be misrepresenting themselves.
Audience:
Behavior:
Condition:
Degree:
Step 4.2 – Identify information in a user name that might lead to their identity.
Audience:
Behavior:
Condition:
Degree:
Step 4.3 - Recognize that experienced people can track you through information gained on the Internet.
Audience:
Behavior:
Condition:
Degree:
Step 4.4 – Identify what you should do if you are approached on the Internet for a meeting.
Audience:
Behavior:
Condition:
Degree:
Step 5.0 Recognize that predators and bullies exist online.
Audience:
Behavior:
Condition:
Degree:
Step 5.1 – Identify the signs of Internet Grooming.
Audience:
Behavior:
Condition:
Degree:
Step 5.2 – Identify the signs of Flaming.
Audience:
Behavior:
Condition:
Degree:
Step 5.3 - Identify where to report incidents of Flaming and Grooming when they occur.
Audience:
Behavior:
Condition:
Degree:
Step 6.0 – Recognize that the VBCPS AUP governs computer use within the school system.
Audience:
Behavior:
Condition:
Degree:
Step 6.1 – Identify the parts of the Student Code of Conduct which are the school systems computer Acceptable Use Policy, including consequences of actions.
Audience:
Behavior:
Condition:
Degree:
Step 6.2 - Recognize websites are filtered for appropriate content when using the Internet within the VBCPS network.
Audience:
Behavior:
Condition:
Degree:
Step 6.3 – Identify what constitutes software misuse when using a VBCPS computer system.
Audience:
Behavior:
Condition:
Degree:
Step 6.4 – Identify what constitutes hardware misuse when using a VBCPS computer system.
6.4
Audience:
Behavior:
Condition:
Degree:
Terminal Goal
inform all middle school students entering the Virginia Beach City Public Schools about making safe choices when using the Internet
Objective
Assessment Item(s)
Step 1.0 – Recognize the Internet is a powerful tool.
Audience:
Behavior:
Condition:
Degree:
Step 1.3 -Recognize the internet can be used for research, social interaction, consumer purchases, political activity.
Audience:
Behavior:
Condition:
Degree:
Step 1.4 – Recognize that dangers lurk on the Internet and can take the form of predators, identity theft, bad information, viruses, spyware, cyberbullying.
Audience:
Behavior:
Condition:
Degree:
Step 1.5 – Recognize that basic precautions such as virus protection, evaluating website validity and recognizing cyberbullies can be taken to protect yourself while surfing the Internet.
Audience:
Behavior:
Condition:
Degree:
Step 2.0 – Identify the process for evaluating website validity.
Audience:
Behavior:
Condition:
Degree:
Step 2.1 - Recognize all information presented on the Internet is not valid.
Audience:
Behavior:
Condition:
Degree:
Step 2.2 – Recognize that information on the Internet might be posted to discredit a person, to further a political agenda or for other hidden agendas
Audience:
Behavior:
Condition:
Degree:
Step 2.3 – Identify the steps take to evaluate a website
Audience:
Behavior:
Condition:
Degree:
Step 2.4 – Identify the website extensions .edu, .org, .gov, .com, .us, .au and what type of organization owns that site.
Audience:
Behavior:
Condition:
Degree:
Step 3.0 – Recognize that steps must be taken to maximize protection while using the Internet.
Audience:
Behavior:
Condition:
Degree:
Step 3.1 – Identify the use of virus software and how it can protect you while using the Internet.
Audience:
Behavior:
Condition:
Degree:
Step 3.2 – Recognize that giving out personal information such as full name, address, phone no, age can place you at possible risk on the Internet.
Audience:
Behavior:
Condition:
Degree:
Step 3.3 – Identify the process of Phishing on the Internet.
Audience:
Behavior:
Condition:
Degree:
Step 3.4 -Recognize that P2P file sharing can result in viruses and can violate copyright laws.
Audience:
Behavior:
Condition:
Degree:
Step 4.0 – Recognize that people misrepresent themselves on the Internet.
Audience:
Behavior:
Condition:
Degree:
Step 4.1 – Recognize that messages might be sent from an anonymous source and a user might be misrepresenting themselves.
Audience:
Behavior:
Condition:
Degree:
Step 4.2 – Identify information in a user name that might lead to their identity.
Audience:
Behavior:
Condition:
Degree:
Step 4.3 - Recognize that experienced people can track you through information gained on the Internet.
Audience:
Behavior:
Condition:
Degree:
Step 4.4 – Identify what you should do if you are approached on the Internet for a meeting.
Audience:
Behavior:
Condition:
Degree:
Step 5.0 Recognize that predators and bullies exist online.
Audience:
Behavior:
Condition:
Degree:
Step 5.1 – Identify the signs of Internet Grooming.
Audience:
Behavior:
Condition:
Degree:
Step 5.2 – Identify the signs of Flaming.
Audience:
Behavior:
Condition:
Degree:
Step 5.3 - Identify where to report incidents of Flaming and Grooming when they occur.
Audience:
Behavior:
Condition:
Degree:
Step 6.0 – Recognize that the VBCPS AUP governs computer use within the school system.
Audience:
Behavior:
Condition:
Degree:
Step 6.1 – Identify the parts of the Student Code of Conduct which are the school systems computer Acceptable Use Policy, including consequences of actions.
Audience:
Behavior:
Condition:
Degree:
Step 6.2 - Recognize websites are filtered for appropriate content when using the Internet within the VBCPS network.
Audience:
Behavior:
Condition:
Degree:
Step 6.3 – Identify what constitutes software misuse when using a VBCPS computer system.
Audience:
Behavior:
Condition:
Degree:
Step 6.4 – Identify what constitutes hardware misuse when using a VBCPS computer system.
6.4
Audience:
Behavior:
Condition:
Degree:
Terminal Goal
inform all middle school students entering the Virginia Beach City Public Schools about making safe choices when using the Internet
Audience:
Behavior:
Condition:
Degree: